2022 26th International Conference on Pattern Recognition (ICPR) 2022
DOI: 10.1109/icpr56361.2022.9956521
|View full text |Cite
|
Sign up to set email alerts
|

Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Finally, Zhai et al, [20], proposed a clustering-based backdoor attack that targeted speaker verification. The authors in [37] proposed an audio steganography-based personalized trigger for backdoor attacks on speaker verification systems. In this study, we focus (Figure 1) solely on backdoor attacks using model training data poisoning [38], [39], in which attackers can only manipulate training samples without having any information about the victim's model.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, Zhai et al, [20], proposed a clustering-based backdoor attack that targeted speaker verification. The authors in [37] proposed an audio steganography-based personalized trigger for backdoor attacks on speaker verification systems. In this study, we focus (Figure 1) solely on backdoor attacks using model training data poisoning [38], [39], in which attackers can only manipulate training samples without having any information about the victim's model.…”
Section: Related Workmentioning
confidence: 99%